CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Transient DOS when processing a NULL buffer while parsing WLAN vdev. |
Memory corruption while running VK synchronization with KASAN enabled. |
Transient DOS when WLAN firmware receives "reassoc response" frame including RIC_DATA element. |
While processing the authentication message in UE, improper authentication may lead to information disclosure. |
Memory corruption while processing IOCTL call for getting group info. |
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix node corruption in ar->arvifs list
In current WLAN recovery code flow, ath11k_core_halt() only
reinitializes the "arvifs" list head. This will cause the
list node immediately following the list head to become an
invalid list node. Because the prev of that node still points
to the list head "arvifs", but the next of the list head "arvifs"
no longer points to that list node.
When a WLAN recovery occurs during the execution of a vif
removal, and it happens before the spin_lock_bh(&ar->data_lock)
in ath11k_mac_op_remove_interface(), list_del() will detect the
previously mentioned situation, thereby triggering a kernel panic.
The fix is to remove and reinitialize all vif list nodes from the
list head "arvifs" during WLAN halt. The reinitialization is to make
the list nodes valid, ensuring that the list_del() in
ath11k_mac_op_remove_interface() can execute normally.
Call trace:
__list_del_entry_valid_or_report+0xb8/0xd0
ath11k_mac_op_remove_interface+0xb0/0x27c [ath11k]
drv_remove_interface+0x48/0x194 [mac80211]
ieee80211_do_stop+0x6e0/0x844 [mac80211]
ieee80211_stop+0x44/0x17c [mac80211]
__dev_close_many+0xac/0x150
__dev_change_flags+0x194/0x234
dev_change_flags+0x24/0x6c
devinet_ioctl+0x3a0/0x670
inet_ioctl+0x200/0x248
sock_do_ioctl+0x60/0x118
sock_ioctl+0x274/0x35c
__arm64_sys_ioctl+0xac/0xf0
invoke_syscall+0x48/0x114
...
Tested-on: QCA6698AQ hw2.1 PCI WLAN.HSP.1.1-04591-QCAHSPSWPL_V1_V2_SILICONZ_IOE-1 |
Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host. |
Memory corruption while copying the result to the transmission queue in EMAC. |
Transient DOS while processing 11AZ RTT management action frame received through OTA. |
Memory corruption in Core when updating rollback version for TA and OTA feature is enabled. |
Cryptographic issue in Automotive while unwrapping the key secs2d and verifying with RPMB data. |
Information disclosure in Core services while processing a Diag command. |
Memory corruption in HLOS while running playready use-case. |
Transient DOS in Data Modem during DTLS handshake. |
Memory corruption in Audio during playback with speaker protection. |
Memory corruption in Automotive Multimedia due to improper access control in HAB. |
Memory corruption during concurrent access to server info object due to incorrect reference count update. |
Memory corruption while processing an IOCTL call to set mixer controls. |
Memory corruption while sound model registration for voice activation with audio kernel driver. |
Memory corruption while reading secure file. |